You are on page 1of 79
Maharashtra State Board of Technical Education, Mumbai u Teaching and Examination Scheme for Post S.S.C. Diploma Courses Program Name: Diploma in Computer Engineering / Diploma in Computer Technology / Diploma in Computer Science and Engineering Program Code : CO/CM/CW With Effect From Academic Year: 2017 - 18 “Duration of Program : 6 Semesters Duration : 16 Weeks ‘Semester : Sixth ‘Scheme :I Tasting saminaton Scheme Course s ours Tite | course crit Theary | Pract | Grana N Conres=Eh Abore | code | |p| p | (L+T+P) Gram [ESE PA Toal__|__ ESE PA Tom Total | Duratioo|-Max | Min | Max | Min | Max] Min] Max | Min] Max | Min] Max | Min | | in rs. | Marks [Marks| Marks Marks| Marks | Marks| Marks Marks| Marks Marks) Marka) Marks 1 | Management MGT | 22509 3]-|-] 3 Min or] 28 | 30*| 00 | 100] 4) - |-|- | - | - | - | 100 2 | Programming with Python | PWP |22616/3|-|2| 5 | 3 | 70 | 28 | 30*| 00 | 100| 40 | 25@| 10 | 25 | 10 | 50 | 20 | 150 3, Mobile Application map |22617|3|-| 4) 7 | 3 | 70 | 28 |30*| 00 | 100] 40 | 2s¢ | 10 | 25 | 10 | so | 20 | 150 Development | 17 Emerging Trends in 30 4 | Computer and information | ETI |22618|3)-]- | 3 | agp, [70%#| 28 | 30*| 00 | 100) 40) - | ~ | = | =~ | = | = | 100 Technolgy L [Elective ~ I Select Any One) "| Web Based Application : : | [Developmen tsingPHe | WBP | 2619/3 |-[2| 5 | 3 | 70 | 28] 30° | 00 | 100 | 40 | a5@| 10 | 25 | 10 | 50 | 20 | 150 | 5 See end Infernal nis | 22620/3]}-|2| 5 3 | 70 | 28 | 30*| 00 | 100 | 40 | 25@| 10 25 | 10 | so | 20 | 150 Data Warehousing with 1 7 ] Mining Techniques pwm | 2221}3|-|2| 5 | 3 | 70 | 28 | 30*| 00 | 100 | 40 | 25@| 10 | 25 | 10 | so | 20 | 150 | Enterpreneurshi [6 | Enterpreneurship 2[-J2] 4 ]-]- )-]-)-] - | - | soe] 20 | so] 20 | 100} 40 | 100 Development | 50@ ‘Capstone Project - | If Candidate not securing minimum marks for passing in the “PA” part of practical of any course of any semester then the candidatelg “Detained” for that semester. MSBTE ~ Final Cony Dt. 24.09.2019 ‘Management Course Code: 22509, ProgramName __: Diploma in Automobile Engineering / Civil Engineering Group / Electronics Engineering Group / Diploma in Plastic Engineering / Diploma in Production Engineering /Diploma in Fashion & Clothing Technology/ Computer Engineering Group Program Code : AE/CE/CR/CS/ DE/EJ/ET/EN/EX/EQUS/C/IE/PG/PT/DC/ CO/CM/CWAF Semester th Course Title : Management. Course Code 322509 1. RATIONALE ‘An engineer has to work in industry with human capital and machines. Therefore, managerial skills are essential for enhancing their employability and career growth. This course is therefore designed to provide the basic concepts in management principles, safety aspects and Industrial Acts. 2 COMPETENCY The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences: Use relevant managerial skills for ensuring efficient and effective management. 3. COURSE OUTCOMES (COs) ‘The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency: Use basic management principles to execute daily activities. Use principles of planning and organising for accomplishment of tasks. Use principles of direeting and controlling for implementing the plans. Apply principles of safety management in all activities. Understand various provisions of industrial acts. eaege 4, TEACHING AND EXAMINATION SCHEME “Teaching. rr Teaching Examination Scheme Create Theory Practical |r) p [OTP paper [ESE | PA Total ESE, PA Total rs. | Max [Min | Max | Min | Max | Min| Max | atin | Max | Min | Max | Min s{-[—] 3 | 22, fre | 2s [0 | 00 fro feof - f-f-]-f- | - (*#) Online Theory Examination. (*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessment of the cognitive domain UOs requiced-f attainment of the Cos.(*#): Online examination “ MSBTE - Final Copy Dt. 24.09.2019 Page 1 of 6 Management Course Code: 22509 Legends: L-Lecture; T — Tutorial/Teacher Guided Theory Practice; P - Practical; C ~ Credit, ESE - End Semester Examination; PA - Progressive Assessment 5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) This course map illustrates an overview of the flow and linkages of the topics at various levels of outcomes (details in subsequent sections) to be attained by the student by the end of the course, in all domains of learning in terms of the industry/employer identified competency depicted at the centre of this map. ‘Klein at Mie ronson site eae {SB gli “efor nc o ee Paes (SED (OBE. pes ee oa oe Se oincrnivedane > Figure 1 - Course Map 6. SUGGESTED PRACTICALS/ EXERCISES = Not applicable - 7, MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED = Not applicable - 8. UNDERPINNING THEORY COMPONENTS The following topics are to be taught and assessed in order to develop the sample UOs given below for achieving the COs to attain the identified competency. More UOs could be added. MSBTE — Final Copy Dt. 24.09.2019 Page 2 of 6 Management Course Code: 22509 Unit Unit Outcomes (UOs) Topics and Sub-topics (in cognitive domain) Unit -1 la. Differentiate the concept and 1.1 Definitions of management, role Introduction principles of management for the | and importance of management. to given situation. 1.2 Management characteristics and management | Ib. concepts and managerial | Ic, Explain functions of management for given situation. Compare the features of the principles, levels of management and their functions; management, administration and organization, level | Unit and level Planning and organizing at supervisory | 2b. mI Directing Controlling at supervisory planning and planning activities for the given situation, Suggest the step wise procedure to complete the given activity in the shop floor. 2c. Prepare materials and manpower budget for the given production activity. Describe with block diagrams the organization of the physical resources required for the given situation. 2e. Describe the human needs to isfy the job needs for the specified situation. 2f. List the tasks to be done by the concemed individuals for 2d, 3a, Justify the chosen need of directions and instructions to the subordinates to complete the specified task. 3b. Select the feasible set of instructions to complete the given imple task, with justification 3c. Predict the possible mistakes for completing the given simple activity completing the given activity. skills given types of planning relation between management and 1d. Suggest the steps in organizing in | administration, the given situation. 1.3 Functions of management: le, Suggest suitable type of planning, organizing, organization for the given Teading/directing, staffing and example. controlling. 1f, Identify the functional areas of | 1.4 Types of planning and steps in management for the given planning situation 1:5 Types of organization, Steps in Ig. Suggest suitable managerial skills | organizing for given situation with 1.6 Functional areas of management. justification 1.7 Managerial skills Unit-11 2a, Differentiate the nature of Planning at supervisory level 2.1 Planning by supervisor. 2.2 Planning activities, detailing and following of each step. 2.3 Prescribing standard forms for various activities. 2.4 Budgeting for materials and ‘manpower. Organizing at supervisory level 2.5 Organizing the physical resources, 2.6 Matching human need with job needs 2.7 Allotment of tasks to individuals. and establishing relationship among persons working in a group Directing at supervisory level 3.1 Needs for directions and instructions to subordinates; Completeness and feasibilities of nstructions 3.2 Personal counselling advanced predictions of possible mistakes. 3.3. Elaborating decisions, laying disciplinary standards in overall working 0 ~ __|3d. Describe the managerial control ontrolling ay/su MSBTE Final Copy Dt. 24.09.2019 Page 3 of 6 Management Course Code: 22509 Unit Unit Outcomes (UOs) Topies and Sub-topies (in cognitive domain) - actions and remedial measures | 3.4 Managerial control; required to be taken for Understanding team and link completing the given task between various departments in successfully respect of process and quality standards; Steps in control process 3.5 Controlling methods; Control over the performance in respect of quality, quantity of production, time and cost. Measuring performance, comparing with standards, correcting unfavorable - deviations. - Unit-1V | 4a. State the general safety norms | 4.1 Need for safety management Safety required to be taken in the given measures Management | case. 4.2 General safety norms for an 4b. Suggest preventive measures of industrial unit; Preventive plant activities in the given ‘measures situation, 4.3 Definition of accident, types of 4c. Describe the safe procedural steps | industrial accident; Causes of required to be taken to prevent accidents; the given the type of accident. | 4.4 Fire hazards; Fire drill 4d. Prepare a work permit in to 4,5 Safety procedure conduct the given maintenance | 4.6 Work permits. activity. 4e. Explain the causes of the specified type of accident in the given situation, 4f. Prepare the specifications of the firefighting equipment required for the given type of fire. - Unit=V Sa. Explain the purpose of the act | 5.1 Necessity of acts, Important Legislative | Sb. Explain the main provisions of definition and Main provisions of Acts the various acts and important acts. definition. 5.2 Industrial Acts: a. Indian Factory Act b. Industrial Dispute Act cc. Workman Compensation Act d._ Minimum Wages Act Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve the ‘Application Level’ and above of Bloom's ‘Cognitive Domain Taxonomy’ 9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN [ Unit Unit Title [Teaching | Distribution of ‘Theory, Marks No. Hours R u [A Level_| Level | Level 1 [Introduction to management 12 06 | 06 | oF MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 6 z a Management Course Code: 22509 Unit it Title [Teaching | Distribution of Theory Marks No. Hours R U A | Total Level_| Level | Level | Marks coneepts and managerial skills TT | Planning and organizing at 08 ov | 06 | 04 | 14 supervisory level | Ti | Directing and controlling at 08 o4 | 06 | oF | 14 supervisory level TV_| Safety Management 08 04 [06 | 04 [14 V_|Legislative Acts 12 o2_| 06 | 04 | 12 Total 48 20 | 30 | 20 | 70 Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy) Note: This specification table provides general guidelines to assist student for their learning ‘and 0 teachers to teach and assess students with respect to attainment of UOs. The actual istribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table 10. SUGGESTED STUDENT ACTIVITIES Other than the classroom and laboratory learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences for thei (student’s) portfolio which will be useful for their placement interviews a. Write assignments based on the theory taught in classrooms. Assignments consist of ten questions having long answers including charts, symbols, drawing, observations ete b. Prepare/Download information about various industrial acts. c. Visit to any Manufacturing industry and prepare a report consisting of: i, Organization structure of the organization/ Dept. ii, Safety measures taken in organization. iii, Mechanism to handle the disputes. iv, Any specifie observation you have noticed. d. Give seminar on relevant topi ¢. Undertake micro-projects. 11, | SUGGESTED SPECIAL INSTRUCTIONAL STRATE These are sample strategies, which the teacher can use to ac various outcomes in this course: a. Massive open online courses (MOOCS) may be used to teach various topies/sub topics. b. ‘L? in item No. 4 does not mean only the traditional lecture method, but different types of teaching methods and media that are to be employed to develop the outcomes, c. About 15-20% of the topics/sub-topics which is relatively simpler or descriptive in nature is to be given to the students for self-directed learning and assess the development of the COs through classroom presentations (see implementation guideline for details). 4. With respect 10 item No.10, teachers need to ensure to create opportunities and provisions for co-curricular activities. ©. Guide student(s) in undertaking micro-projects. f, Demonstrate students thoroughly before they start doing the pract IES (if any) rate the attainment of the MSBTE — Final Copy Di. 24.09.2019 Page 5 of 6 “Management Course Code: 22509 g. Encourage students to refer different websites to have deeper understanding of the subjeet. h. Observe continuously and monitor the performance of students in Lab. 12, SUGGESTED MICRO-PROJECTS Only one micro-project is planned to be undertaken by a student that needs to be assigned to hiny/her in the beginning of the semester. In the first four semesters, the micro-project are group-based, However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three. The micro-project could be industry application based, internet-based, workshop- based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain dated work diary consisting of individual contribution in the project work and give a seminar presentation of it before submission, The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit micro-project by the end of the semester to develop the industry oriented COs. A suggestive list of micro-projects are given here. Similar micro-projects could be added by the concerned faculty: Study of management principles applied to a small scale industry, Study of management principles applied to a medium scale industry. Study of management principles applied to a large scale industry. Prepare case studies of Safety measures followed in different types of organization. Study of measures to be taken for ensuring cyber security. peege 13. SUGGESTED LEARNING RESOURCE No. Title of Book Author Publication 1 | Management and ‘Veerabhadrappa, ‘New age international publishers, entrepreneurship Havinal New Delhi, 2014: ISBN: 978-81- 224-2602-1 2 | Principles of management | Chaudhry omvir New Age international publishers, Singh prakash 2012, New Delhi ISBN: 978-81- | ts 224-3039-4 — 3. | Industrial Engineering and |Dr.O.P. Khanna | Dhanpath ray and sons, New Delhi |__| management — Industrial Engineering and | Banga and Sharma | Khanna Publication, New Delhi | management I 14. SUGGESTED SOFTWARE/LEARNING WEBSITES a,__https://www.versesolutions.com/ https://www.books.google.co.in/books?isbn=817758412X https:/www. www.educba.com » Courses » Business » Management MSBTE ~ Final Copy Dt. 24.09.2019 Page 6 of 6 ol Programing with Python Course Code: 22616 ProgramName _ : Computer Engineering Program Group Program Code: CO/CM/IF/CW Semester : Sixth Course Title : Programming with ‘Python’ Course Code 222616 1. RATIONALE Python is powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python code is simple, short, readable, intuitive, and powerful, and thus it is effective for introducing computing and problem solving to beginners. It's elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms. 2. COMPETENCY The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences: * Develop general purpose programming using python to solve problems 3. COURSE OUTCOMES (COs) The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry-oriented COs associated with the above-mentioned competency: a) Display message on screen using Python script on IDE. b)_ Develop python program to demonstrate use of Operators c) Perform operations on data structures in Python. 4) Develop functions for given problem. e) Design classes for given problem. 1) Handle exceptions. 4. TEACHING AND EXAMINATION SCHEME ee Examination Seheme Scheme 2 Credit | 7 rr Theory Practical Lit|P Paper |__ESE PA Toul | ESE PA, Tol a | Hes, [Max [Min [Max [Min | Max [Min] Max | Min | Max | Min | Max | Min 3[-[2]{ 5 [3 | 7 | 28 [30° [ 00 | 100 | 40 | 25@[ 10 [ 25 | 10 | 50 | 20 (*): Under the theory PA, out of 30 marks, 10 marks are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessment of the UOs required for the attainment of the COs. Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P - Practical; C— Credit, ESE - End Semester Examination; PA - Progressive Assessment 5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) This course map illustrates an overview of the flow and linkages of the topics at various levels of outcomes (details in subsequent sections) to be attained by the student by the enit Fhe MSBTE inal Copy Dt. 24.09.2019 Page 1of9 Programming wth Python Course Cote: 22616 course, in all domains of learning in terms of the industry/employer identified competency depicted at the centre of this map. oleae Cea Tota cnt Ce Us See Figure 1 - Course Map 6. SUGGESTED PRACTICALS/ EXERCISES ‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. | Approx. 7 Practical Outcomes (PrOs) Nae) rs. - - Required 1 [install and configure Python IDE T 2 2__| Write simple Python program to display message on sereen 1 2 3. | Write simple Python program using operators 1 02 a) Arithmetic Operators b) Logical Operators )_Bitwise Operators _ 4 | Write simple Python program to demonstrate use of conditional statements: a) ‘if statement MSBTE ~ Final Copy Dt. 24.09.2019 Page 2 0f9 Programming wih Python Course Code: 22616 Practical Outcomes (PrOs) Unit No. Approx. Hrs. Required b) “if... else” statement c)_Nested ‘if statement ‘Write python program to demonstrate use of looping statements: a) ‘while’ loop b) ‘for’ loop ©) _Nested loops 1 02 ‘Write python program to perform following operations on Li a) Create list b) Access list ©) Update list (Add item, Remove item) d) Delete list I 02 ‘Write python program to perform following operations on Tuples: a) Create Tuple b) Access Tuple ©) Update Tuple d) Delete Tuple MI 02 ‘Write python program to perform following operations on Tuples: a) Create Set b) Access Set elements ©) Update Set a) Delete Set ci 02 Write python program to perform following operations on Dictionaries: a) Create Dictionary b) Access Dictionary elements ©) Update Dictionary 4) Delete Set e) Looping through Dictionary IIL 02 10 i a) Write Python program to demonstrate math built-in functions (Any 2 programs) b) Write Python program to demonstrate string bui (Any 2 programs) in functions wv 02 Develop user defined Python function for given problem: a) Function with minimum 2 arguments b) Funetion returning values W 02 12 Write Python program to demonstrate use of: a) Builtin module (¢.g. keyword, math, number, operator) b) user defined module. IV 02 13 Write Python program to demonstrate use of: a) built-in packages (e.g. NumPy, Pandas) ») user defined packages vv 02 14 ‘Write a program in Python to demonstrate following operations: a) Method overloading b) Method overriding _ ‘Write a program in Python to demonstrate following operations: a) Simple inheritance b) Multiple inheritance MSBTE — Final Copy Dt. 24.09.2019 Page 3 of 9 Programming with Python Course Code: 22616 || Approx. S. Practical Outcomes (PrOs) Unit | Hrs. No. No. Fi Required 16 | Write a program in Python to handle user defined exception for | VI 02 given problem Total 32 Note i. A suggestive list of PrOs is given in the above table. More such PrOs can be added to attain the COs and competency. All the above listed practical need to be performed compulsorily, so that the student reaches the ‘Applying Level’ of Blooms's ‘Cognitive Domain Taxonomy’ as generally required by the industry. ii, The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed according to a suggested sample given below. ‘S.No. Performance Indicators Weightage in % 1 _| Correctness of business logic 7 40 | 2 | Debugging ability 20 3 | Quality of input and output displayed (messaging and 10 formatting) 4 | Answer to sample questions 20 5__| On time term work submission 10 Total 100 ‘The above PrOs also comprise of the following social skills/attitudes which are Affective Domain Outcomes (ADOs) that are best developed through the laboratory/field based experiences: a) Work collaborativel b) Follow ethical practices. team The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of practical experiences over a period of time, Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below: © ‘Valuing Level” in 1" year. © ‘Organization Level’ in 2" year. * ‘Characterization Level’ in 3" year. 1 MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED ‘The major equipment with broad specification mentioned here will usher in uniformity in conduct of practicals, as well as aid to procure equipment by authorities concerned. = Equipment Name with Broad Specifications a ie 1 | Computer system All |__| (Any computer system with basic configuration) 2_[*Python’ Interpreter/ IDE es 1 Copy Dt. 24.09.2019 Page 4 of 9 Si Programming with Python Course Code 22616 8. UNDERPINNING THEORY COMPONENTS The following topics/subtopics should be taught and assessed to develop UOs in cogn domain for achieving the COs to attain the identified competency. More UOs could be added. Unit Unit Outcomes (UOs) Topics and Sub-topies (in cognitive domain) Unit=1 _| la Identify the given 1 Features of Python — Interactive, Object Introducti_ | — Variables, Keywords and ~ oriented, Interpreted, platform on and constants in Python independent Syntax of | 1b.Use indentation, comments | 1.2 Python building blocks ~ Identifiers, Python in the given program. Keywords, Indention, Variables, Program | lc. Install the given Python Comments IDE and editor. 13. Python environment setup — Installation 1d.Develop the python and working of IDE program to display the 14 Running Simple Python seripts to given text. display ‘welcome’ message, 1.5 Python Data Types: Numbers, String, Tuples, Lists, Dictionary. Declaration and use of data types Unit-1 | 2a. Wiite simple Python 2.1 Basie Operators: Arithmetic, Python program for the given Comparison/ Relational, Assignment, Operators arithmetic expressions. Logical, Bitwise, Membership, Identity and 2b, Use different types of operators, Python Operator Precedence Control operators for writing the | 2.2 Control Flow: Flow the arithmetic expressions. | 2.3 Conditional Statements (if, if ... else, statements | 2c. Write a ‘Python’ program nested if) using decision making 2.4 Looping in python (while loop, for loop, structure for two-way. nested loops) branching to solve the 2.5 loop manipulation using continue, pass, given problem. break, else. 2d. Write a ‘Python’ program using decision making structure for multi-way branching to solve the ven problem. MSBTE — Final Copy Dt. 24.09.2019 Page 5 0f9 Programming with Python Coutse Code: 22616 Unit Unit Outcomes (UOs) Topics and Sub-topies _(in cognitive domain) Unit- HIT | 3a. Write python program to 3.1 List: Data use and manipulate lists for | a) Defining lists, accessing values in list, Structures | the given problem deleting values in list, updating lists. in Python | 3b. Write python program to |b) Basic List Operations use and manipulate Tuples | c) Built-in List functions for the given problem 3.2 Tuples: 3e, Write python program to a) Accessing values in Tuples, deleting use and manipulate Sets for | values in Tuples, and updating Tuples. the given problem b) Basic Tuple operations. 3d. Write python program toc) Built_in Tuple functions use and manipulate 8.3. Sets: Dictionaries for the given | a) Accessing values in Set, deleting values problem in Set and updating Sets. b) Basic Set operations. ©) Built — in Set functions 3.4 Dictionarie: a) Accessing values in Dictionary, deleting values in Dictionary and updating Dictionary. b) Basic Dictionary operations, ¢) Built - in Dictionaries functions Unit-IV_ | 4a.Use the Python standard 4.1 Use of Python built — in functions (e.g Python functions for the given type/ data conversion functions, math Functions, | problem. functions etc.) modules, | 4b.Develop relevant user ‘4.2. User defined functions: Function and defined functions for the definition, Function calling, function Packages given problem using Python | arguments and parameter passing, Return code. statement, Scope of Variables: Global 4c. Write Python module for variable and Local Variable. the given problem |4.3 Modules: Writing modules, importing 4d. Write Python package for modules, importing objects from the given problem modules, Python built — in modules (e.g. Numeric and mathematical module, Functional Programming Module) Namespace and Scoping. [4.4 Python Packages: Introduction, Writing Python packages, Using standard (e.g, math, seipy, Numpy, matplotlib, pandas | | __ etc.) and user defined packages Unit-V | 5a Create classes and objects | 5.1 Creating Classes and Objects. Object to solve the given problem, | 5.2 Method Overloading and Overriding. Oriented | 56 Write Python code for data | 5.3 Data Hiding Program hiding for the given 5.4 Data abstraction. ming in| problem. 5.5 Inheritance and composition classes Python | 5c Write Python code using _| 5.6 Customization via inheritance data abstraction for the specializing inherited methods. given problem, Sd Write Python program using inheritance for the MSBTE — Final Copy Dt. 24.09.2019 Page 6 0f9 Programming with Python Course Code: 22616 Unit (in cognitive domain) given problem. it Outcomes (UOs) ‘Topics and Sub-topics | Unit—VI | Ga Write Python code for the —_| 6.1 I/O Operations: Reading keyboard input, File VO given reading values from Printing to screen Handling keyboard 6.2 File Handling: Opening file in different and 6b Read data from the given modes, accessing file contents using Exception file. standard library functions, Reading and Handling | 6c Write the given data to a writing files, closing a file, Renaming and file, deleting files, Directories in Python, File 6d Handle the given and directory related standard functions exceptions through Python | 6.3 Exception Handling: Introduction, program, Exception handling - ‘try: except: statement, ‘raise’ statement, User defined exceptions Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy" 9, SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN : ~~ |_ Distribution of Theory Marks ; | Nut Unit Title Teaching |g» | vu | A | Total . L “| Level_| Level | Level | Marks 1 _ | Ialzoduction and Syntax of Python uw w 04 os Program - 1 | Python Operators and Control Flow |g o 7 oa 10 statements - : | Mit | Data Structures in Python 2 e | | o | ty _| Python Funetions, modules, and i‘ o )o 7) 0 ll uw Packages “ _| y | Object Oriented Programming in| og » |o lo |v Python = V1_ [ile 0 Handling and Exception 06 wo lolol! Handling L Total 8 pm | 1 | 2 | 70 Legends: R=Remember, U=Understand, A=Apply and above (Bloom’s Revised taxonomy) Note: This specification table provides general guidelines to assist student for their learning dand to teachers to teach and assess students with respect to attainment of UOs. The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table. 10. SUGGESTED STUDENT ACTIVITIES Other than the classroom and laboratory learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various ‘outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences forstheir (student’s) portfolio which will be useful for their placement interviews: NS} MSBTE ~ Final Copy Dt. 24.09.2019 Page 7 of 9 Programing with Python Course Code: 2616 a) Prepare journal of practicals. b) Undertake micro-projects. He SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any) These are sample strategies, which the teacher can use to accelerate the attainment of the various learning outcomes in this course: a) Massive open online courses (MOOCs) may be used to teach various topics/sub topics, b) ‘L’ in item No. 4 does not mean only the traditional lecture method, but different types of teaching methods and media that are to be employed to develop the outcomes: ©) About 15-20% of the topies/sub-topics which is relatively simpler or descriptive in nature is to be given to the students for self-directed learning and assess the development of the COs through classroom presentations (see implementation guideline for details), 4) With respect to item No.10, teachers need to ensure to create opportunities and provisions for co-curricular activities, ©) Guide student(s) in undertaking micro-projects, f) Demonstrate students thoroughly before they start doing the practice. 8) Encourage students to refer different websites to have deeper understanding of the subject. h) Observe continuously and monitor the performance of students in Lab. 12, SUGGESTED MICRO-PROJECTS Only one micro-project is planned to be undertaken by a student that needs to be assigned to him/her in the beginning of the semester. In the first four semesters, the micro-project are group-based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three. The micro-project could be industry application based, intemet-based, workshop- based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs, Each student will have to maintain dated work diary consisting of individual contribution in the project work and give a seminar presentation of it before submission, The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit micro-project by the end of the semester to develop the industry oriented COs. A suggestive list of micro-projects is given here. Similar micro-projects could be added by the concerned faculty: a) Create an English dictionary which i i, Add a word and its meaning. ii, Delete a word and its meaning. iii, Update word or its meaning. iv. Print list of word and its meaning, b) To create simple calculator using classes and objects, ©) Develop student management system which will able to: i) Add ii) Delete iti) Update iv) Display student related information like Roll No, Name, Age, Address, Email-Id, Contact Number ete. d) Any other micro-projects suggested by subject faculty on similar line. (Use fimetions, Classes, Objects and other features of ‘Python’ (o develop xbov applications) able to perform following function. MSBTE — Final Copy Dt. 24.09.2019 Page 8 of 9 a Programming with Python Course Code: 22616 13, | SUGGESTED LEARNING RESOURCES Title of Book Author Publication Rao, K. Nageswara | Scitech Publications (India) Pvt. Ltd. Shaikh Akbar ISBN: 9789385983450 Sth Edition, O’Reilly Publication 1 | Python Programing 2 | Learning Python Lutz, Mark ISBN-13: 978-1449355739 Python Essential 4th Edition, Addison-Wesley 5 | Reference Beazley, David | professional, ISBN: 9780672329784 Head First Python, O'Reilly Publication, 2"! Edition, ISBN 4 | and Baition Paul, Barry 1491919531 14. SOFTWARE/LEARNING WEBSITES a) _https://www.tutorialspoint.com/pythorv/index. htm. b) nptel.ac.in/courses/117106113/34 ©) hutps://www.w3schools.com/python/default.asp 4) _https://www.programiz.com/python-programming ¢)http://spoken-tutorial.org/ £)_https://docs.python. org/3/tutorial/errors.html 2) _bttps://www.w3resource.com/python-exercises! h)_https://www.anandology.com/python-practice-book/ MSBTE ~ Final Copy Dt. 24.09.2019 Page 9 of 9 Mobile Application Development Course Code: 22617 Program Name: Computer Engineering Program Group Program Code : CO/CM/TF/CW Semester Sixth Course Title : Mobile Application Development Course Code 222617 . RATIONALE Android application development is one of the rising and growing trend in the industry of mobile. This course examines the principles of mobile application design and covers the necessary concepts which are required to understand mobile based applications and develop Android based Applications in particular. After completing this course students will design and build a variety of real-time Apps using Android. 2. COMPETENCY The aim of this course is to help the student to attain the following industry identified competency through various teaching leaning experiences: «Create simple Android applications. 3. COURSE OUTCOMES (COs) The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency: a) Interprete features of Android operating system. b) Configure Android environment and development tools. c) Develop rich user Interfaces by using layouts and controls. d) Use User Interface components for android application development. ©) Create Android application using database. f) Publish Android applications. 4, TEACHING AND EXAMINATION SCHEME Teaching xaminaion Scheme +} creti | — \(L+T+P)) Theory 7 Sa Lr Paper [_E PA 5 Tout | |_| ries. lvtax | ntin [vax [in | Max | Min] Max Max | Min af-fat 2 [3 |» | 28 [30 [on [100 [40 as] 10 | 2s | 10 | 30 | 20 (*): Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessment of the UOs required for the attainment of the COs. Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P -Practical; C- Credit, ESE -End Semester Examination; PA - Progressive Assessment 5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) This course map illustrates an overview of the flow and linkages of the topics at various levels of outcomes (details in subsequent sections) to be attained by the student by the exdaf the course, in all domains of learning in terms of the industry/employer identified competehey depicted at the centre of this map. : MSBTE ~ Final Copy Dt. 24.09.2019 Page 1 of 8 ‘Mobile Application Development Course Code: 22617 ee, = > mt ‘ SQLite Database, necessity of SQLite, Creatfon and connection 5.6 37 5.8 MSBTE — Final Copy Di. 24.09.2019 Page 5 of 8 Mobile Application Development Course Code: 22617 Unit Unit Outcomes (COs) Topies and Sub-topies (in cognitive domain) of the database, extracting value from cursors, Transactions. Unit-VI__| 6a. Explain the given location 6.1 SMS Telephony Secu based service. 6.2 Location Based Services: Creating Appli 6b. Write the steps to customize the project, Getting the maps API Deployment the given permissions for key, Displaying the map, users. Displaying the zoom control, 6c. Explain features of the given Navigating to a specific location, android security service. Adding markers, Getting location, 6d. Write the steps to publish the Geocoding and reverse Geocoding, given android App. Getting Location data, Monitoring Location, 6.3. Android Security Model, Declaring and Using Permissions, Using Custom Permission, 6.4 Application Deployment: Creating, Small Application, Signing of application, Deploying app on Google Play Store, Become a Publisher, Developer Console Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy’. 9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PER DESIGN : ~__ | Distribution of Theory Marks ae Unit Title [esti R | U | A | Total : - Level | Level | Level | Marks T-_ | Android and its tools ow | o2 | 2 | - | o Wr Installation and configuration of 06 02 02 02 06 Android J TI_| Ul Components and Layouts os | 2 | o | o4 | 08 IV_| Designing User Interface With View ro | 2 | o | os | 12 ‘y_| Activity and Multimedia with ie | 2 | o | 2 1 20 databases Vi_| Security and Application Deployment_| 18 | 02 | 06 | 12 | 20 Total | 2 | 2 | 38 | 7 Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy) Note: This specification table provides general guidelines to assist students for their learning and 1o teachers to teach and assess students with respect to attainment of LOs. The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table. 10. | SUGGESTED STUDENT ACTIVITIES a Other than the classroom and laboratory learning, following are the suggested studentRlated co-curricular activities which can be undertaken to accelerate the attainment of the vari MSBTE — Final Copy Dt. 24.09.2019 Page 6 of 8 “Mobile Application Development Course Code: 22617 outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences for their (student's) portfolio which will be useful for their placement interviews: a) Prepare journal of practical b) Undertake micro-projects. 1. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any) These are sample strategies, which the teacher can use to accelerate the attainment of the various outcomes in this course: a) Massive open online courses (MOOCs) may be used to teach various topies/sub topics. b) ‘L? in item No. 4 does not mean only the traditional lecture method, but different types of teaching methods and media that are to be employed to develop the outcomes. ©) About 15-20% of the topics/sub-topies which is relatively simpler or descriptive in nature is to be given to the students for self-directed learning and assess the development of the COs through classroom presentations (see implementation guideline for details) d) With respect to item No.10, teachers need to ensure to create opportunities and provisions for co-curricular activities, ¢) Use different Audio Visual media for Concept understanding. 1) Guide student(s) in undertaking micro-projects. g) Demonstrate students thoroughly before they start doing the pra h) Ensure use of latest version of tools. i) Encourage students to refer various web sites to have detail understanding of JSP and related concepts. ji) Encourage students to refer different web-applications to have deeper understanding of web-applications. k) Observe continuously the performance of students in laboratory, 12. SUGGESTED MICRO-PROJECTS Only one micro-project is planned to be undertaken by a student that needs to be assigned to him/her in the beginning of the semester. In the first four semesters, the micro-project are group-based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should of exceed three. The micro-project could be industry application based, internet-based, workshop- based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain dated work diary consisting of individual contribution in the project work and give a seminar presentation of it before submission. ‘The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit micro-project by the end of the semester to develop the industry oriented COs. ‘A suggestive list of micro-projects is given here. Similar micro-projects could be added by the concerned faculty: a) Develop an android application on traffic surveying. b) Develop an android application on online shopping. ©) Develop an android application for making a calculator. d) Develop an android application for game. Guidelines For Developing Micro Projects: MSBTE - Final Copy Dt. 24.09.2019 Page 7 of 8 Ja ‘Mobile Application Development Course Code: 22617 (Implement Following Relevant Guidelines For Micro Projects) i Must implement concepts of Advance java, ii, Must publish the sample application on play store. 13. SUGGESTED LEARNING RESOURCES a Title of Book Author Publication 1 | Anaroia Dixit, Prasanna Vikas Publications, New Delhi 2014, si Kumar ISBN: 9789325977884 Maclean David, aa : 2 | Pro Android 5 Komatineni Satya, | SES rapleagons 2015, ISBN: Allen Grant ‘Android Programming Packet Publication, 2015, 3 | for Beginners Hortan, John | ISBN: 978-1-78588-326-2 14, SOFTWARE/LEARNING WEBSITES a) _https://www.tutorialspoint.com/android b)__hitp://developer.android.com/guide/index.html, ©) _http://developer.android.com/reference/packages.html 4) _http://developer.android.com/guide/components/fundamentals. html ©) _http://developer.android.com/guide/topics/ui/index. html r) /Ideveloper.android.com/guide/topics/ui/declaring-layout.html g) _https://www.tutorialspoint.com/android/android_advanced_tutorial.pdf MSBTE ~ Final Copy Dt. 24.09.2019 Page 8 of 8 X Emerging Trends in Computer and Information Technology Course Code: 22618 ProgramName: Comput Program Code : CO/CMJ/IF/CW Engineering Program Group mester Course Title : Emerging Trends in Computer and Information Technology Course Code + 22618 4a, RATIONALE Advancements and applications of Computer Engineering and Information Technology are ever changing. Emerging trends aims at creating awareness about major trends that will define technological disruption in the upcoming years in the field of Computer Engineering and Information Technology. These are some emerging areas expected to generate revenue, increasing demand as IT professionals and open avenues of entrepreneurship. 4b. COMPETENCY The aim of this course is to help the student to attain the following indus through various teaching learning experiences: + Acquire knowledge of emerging trends. ry identified competency de. COURSE OUTCOMES (COs) Describe Artificial Intelligence, Machine learning and deep learning * Interpret IoT concepts + Compare Models of Digital Forensic Investigation. * Describe Evidence Handling procedures. * Describe Ethical Hacking process. + Detect Network, Operating System and applications vulnerabilities 4d, TEACHING AND EXAMINATION SCHEME, Creat, Teo Frail + |e [To Paper PA_|[ Tort | ESE PA Total 7 tis |Max | Min [Max in [Nox [Mia Max | in | May | Mn | Max | Min 90 y+ i * a « -~| 3 Min | 70" «| 28 | 30* | 00 | 100 | 40 | | | (*): Under the theory PA; Out of 30 marks, 10 marks of theory PA are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests(MCQ type) to be taken during the semester for the assessment of the UOs required for the attainment of the COs.( *#) :Online Examination Legends: L-Lecture; T — Tutorial/Teacher Guided Theory Practice; P -Practical; C ~ Credit, ESE -End Semester Examination; PA - Progressive Assessment. MSBTE - Final Copy Dt. 24.09.2019 Page 1 of 9 Emerging Trends in Computer and Information Technology Course Code: 22618 de. COURSE MAP (with sample COs, UOs, ADOs and topics) This course map illustrates an overview of the flow and linkages of the topics at various levels of ‘outcomes (details in subsequent sections) to be attained by the student by the end of the course, in all domains of learning in terms of the industry/employer identified competency depicted at the centre of this map. em taba ES CONDON Talon 5 Cae hale Co) -Descrie > ime nin a THe S~ = — eplrmngael ‘ohne Nip Ecos “AO. Arte iin Outcome UO in Comnive’™ Domain Figure 1 - Course Map MSBTE— Page 2 of 9 Emerging Trends in Computer and Information Technology Course Code: 22618 4f. SUGGESTED PRACTICALS/ EXERCISES ‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and n the student for the attainment of the competency. Approx. Practical Outcomes (PrOs) UnitNo. | Hrs. Required Not Applicable 4g. | MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED The major equipment with broad specification mentioned here will usher in uniformity in conduct of experiments, as well as aid to procure equipment by authorities concerned. No. Equipment Name with Broad Specifications Pro Not Applicable 4h. UNDERPINNING THEORY COMPONENTS. Unit Outcomes (UOs) Topics and Sub-topics (in cognitive domain) la) Describe the concept of Al. 1.1 Introduction of AI 1b) State the components of Al * Concept 1c) List applications of AL * Scope of AI (6m, 4 brs) | 14) Differentiate between machine * Components of Al learning & deep learning. Types of Al + Application of Al 1.2 Concept of machine learning and __| deep learning. Unit He 2a) State the domains and application | 2.1 Embedded Systems: Internet of | areas of Embedded Systems ‘Embedded system concepts, Things 2b) Describe Io systems in which purpose of Embedded Systems, Architecture of Embedded (18m, 12 hrs) Systems, Embedded Processors- information and knowledge are inferred from data. PIC, ARM. AVR, ASIC. 2c) Describe designs of loT. 2.2 IoT: Definition and characteristics 2d) State loT Issues and challenges in of oT deployment. © Physical design of loT, 0 Things of oT © IoT Protocols * Logical design of IoT, © oT functional blocks, © lof Communication models, © lof Communication APIs, © loT Enabling Teohtiolagips + _loP levels and deployment MSBTE ~ Final Copy Dt. 24.09.2019 Page 3 of 9 Emerging Trends in Computer and Information Technology ~ Unit Outcomes (UOs) Course Code: 22618 Unit _"Gneognitive domain) Topics and Sub-topics templates © IoT Issues and Challenges, Applications * lof Devices and its features: Arduino, Uno, Raspberry Pi, Node Mierocontroller Unit Unit Hl: 3a. Describe the history of digi 3.1 Digital forensics Basies of forensics + Introduction to digital forensic Digital 3b. Define digital forensics * History of forensic Forensics _|3c. List the rules of digital forensic Rules of (8m-Shrs) [3d Be. Digital 4b, Evidence (10M- 08 Hrs) | 4c. Describe the given model of digital forensic investigation. State the ethical and unethical issues in digital forensics the rules of digital evidence. State characteristics of digital evidence. igital forensic * Definition of digital forensic Digital forensics investigation and its goal 3.2 Models of Digital Forensic Investigation * Digital Forensic Research Workshop Group (DFRWS) Investigative Model * Abstract Digital Forensics Model (ADEM) * Integrated Digital Investigation Process (IDIP) + End to End digital investigation process (EEDIP) + Anextended model for cybercrime investigation * UML modeling of digital forensic process model (UMDFPM) 3.3 Ethical issues in digital forensic ‘© General ethical norms for investigators [+ Unethical norms for investigation 41 * Definition of Digital Evidence © Best Evidence Rule * Original Evidence 4.2 Rules of Digital Evidence 4d. Deseribe the given type of | 4.3 Characteristics of Digital Evidence evidences © Locard’s Exchange Principle 4e, Describe the given evidence | pigital Stream of bits handling procedures 4.4 Types of evidence Illustrative, Electronics, Documented, Explainable, Substantial, Festimonial - 4.5 Challenges in evidence havidhing MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 9 [37 A } Emerging Trends in Computer and Information Technology Course Ci Unit Unit Outcomes (UOs) (in cognitive domain) ‘Topies and Sub-topies Unit V: Basics | of Hacking (12M- 8Hrs) Sa) Define hackers, 5b) Describe the need to hack your own systems, 5c) Describe the dangers in systems. Sd) Describe the Ethical hacking Process Se) Identify the Hacker's Mindset * Authentication of evidence * Chain of custody * Evidence validation 4.6 Volatile evidence 5.1 Ethical Hacking ‘How Hackers Beget Ethical Hackers + Defining hacker, Malicious users 5.2 Understanding the need to hack your own systems 5.3 Understanding the dangers your systems face ‘© Nontechnical attacks Network-infrastructure attacks Operating-system attacks Application and other specialized attacks 5.4 Obeying the Ethical hacking Principles © Working ethically * Respecting privacy ‘* Not crashing your systems The Ethical hacking Process Formulating your plan Selecting tools Executing the plan :valuating results + Moving on 5.6 Cracking the Hacker Mindset © What You're Up Against? Who breaks in to computer systems? Why they do it? ‘Planning and Performing Attacks ‘+ Maintaining Anonymity Unit VI: Types 6a. Describe Network Infrastructure 6.1 Network Hacking of Hacking | Vulnerabilities (wired/wireless) Network Infrastructure: (16M- 11 Hrs) | 6b, List operating system © Network Infrastructure Vulnerabilities Vulnerabilities 6c. Describe Messaging Systems © Scanning-Ports Cheat Web Vulnerbiit ee scribe Web Vulnerabilities oe > 6e. Describe Database Vulnerabilities | > a pana © Analysing Network Data and Network Analyzet * MAC-daddy attack \ MSBTE— Final Copy Dt. 24.09.2019 Page sof s Emerging Trends in Computer and Information Technology Course Code: 22618 Unit Outcomes (UOs) isa (in cognitive domain) ‘Topies and Sub-topics Wireless LANs: 1s of Wireless Network ies, * Wireless Network Attacks 6.2 Operating System Hacking * Introduction of Windows and Linux Vulnerabilities 6.3 Applications Hacking Messaging Systems Vulnerabilities, E-Mail Attacks- E-Mail Bombs, Banners, Best practices for minimizing e-mail security risks | Web Applications: * Web Vulnerabilities, * Directories Traversal and Countermeasures, Database system * Database Vulnerabilities * Best practices for minimizing _|__ database security risks 4f, SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN Unit Title — 7 0 i aa fora _ Level_| Level | Level | Marks ; Arica lignes 04 of | 02 | = | 06 1 a oF Things 2 10 | 04 | 04 | as - Bases of Dig Forenis cs 0 | o2 | oo | os WV Dil Evidese 08 06 | 02 | o2 | 10 ye «f= [otela VI (sie i 06 08 02 16 Total 8 38_ | 2 Legends: R=Remember, U=Understand, A=Apply and above (Bloom's Re MSBTE.— Final Copy Dt. 24.09.2019 Page 6 of 9 Emerging Trends in Computer and Information Technology Course Code: 22618 Note: This specification table provides general guidelines to assist students for their learning and to teachers to teach and assess students with respect to attainment of LOs. The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table. 4h. © SUGGESTED STUDENT ACTIVITIES Other than the classroom learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various outcomes in this ‘course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also eollect/record physical evidences for their (student’s) portfolio which will be useful for their placement interviews: a) Prepare report on suggestive case study of digital forensic, digital evidence and hacking as give below: i. The Aaron Cafirey case ~ United Kingdom, 2003 http:/digitalcommons.law.scu.cdu/cgi/viewcontent.gi?artic! ii. The Julie Amero case — Connecticut, 2007 hitp:/dfir.com. br/wp-content/uploads/2014/02/ julieamerosummary.pdf he Michael Fiola case — Massachusetts, 2008 hitp://truthinjustice.org/fiola.htm. b) Prepare report on any given case study of loT 370&context=chtlj 4i. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any) These are sample strategies, which the teacher can use to accelerate the attainment of the various outcomes in this course: a) Massive open online courses (MOOCs) may be used to teach various topics/sub topics. b) ‘L’ in item No. 4 does not mean only the traditional lecture method, but different types of teaching methods and media that are to be employed to develop the outcomes. ©) About 15-20% of the topics/sub-topics which is relatively simpler or descriptive in nature is to be given to the students for self-directed learning and assess the development of the COs through classroom presentations (see implementation guideline for details). 4) With respect to item No.10, teachers need to ensure to create opportunities and provisions for co-curricular activities. e) Use different Audio Visual media for Concept understanding. £) Guide student(s) in undertaking micro-projects. g) Demonstrate students thoroughly before they start doing the practice. h) Observe continuously and monitor the performance of students. 4). SUGGESTED MICRO-PROJECTS Only one micro-project is planned to be undertaken by a student that needs to be assigned to him/her in the beginning of the semester. In the first four semesters, the micro-project is group- based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three. The micro-project could be industry application based, internet-based, workshop-based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of UOs and ADOs. Each student will have to maintain datéd work diary consisting of individual contribution in the project work and give a semjnat presentational it MSBTE - Final Copy Dt. 24.09.2019 Page 7 of 9 Emerging Trends in Computer and Information Technology Course Code: 22618 before submission. The total duration of the micro-project should not be les student engagement hours duting the cours: than 16 (sixteen) The student ought to submit micro-project by the end of the semester to develop the industry-oriented COs, A suggestive list of micro-project s given here. Similar micro-projects could be added by the concemed faculty: a) 1oT Based Humidity and Temperature Monitoring i Explain the need of loT Based Humidity and Temperature Monitoring, ii ‘What will be the hardware requirements for designing this system. ii. What will be the software requirements iv. Explain how circuit can be designed for this system along with its working ve Explain how to design an IoT application and how to store and retrieve a data on it. b) [oT based Weather Monitoring System i Explain the need of loT Based Weather Monitoring System, What will be the hardware requirements for designing this system, What will be the software requirements Explain how circuit can be designed for this system along with its working ‘xplain how to design an IoT application and how to store and retrieve a data on it. ©) Study any case of fake profiling. Identify ‘The way digital forensics was used in detecting the fraud. ii, Where was digital evidence located? iii, Effers. ) Study any case of forgery /falsification crime case solved using digital forensics: i Identify the model used for Digital Investigation. ii, Was investigation done ethically or unethically. iii, Where was digital evidence found for crime establishment? iv. State the punishment meted ©) Study Credit card fraud as an identity threat. Identify: i Use of digital media in carrying out fraud, ii Vulnerability Exploited, iii Effect of fraud. iv. Protection/Precaution to be taken against such frauds. 1) Study any Trojan attack. Identify the Trojan attack: i, State the way trojan got installed on particular Machine. ii, State the effects of the Trojan. iii. __Elaborate/Mention/State protection/Blocking mechanism for this specific Trojan, example specification of any anti-threats platform which filters the Trojan. MSBTE— 1 Copy Dt. 24.09.2019 Page 8 of 9 Emerging Trends in Computer and Information Technology Course Code: 22618 4k. SUGGESTED LEARNING RESOURCES : Title of Book Author Publication 1.| Antiticial Intelligence | R.B. Mishra PHI Introduction to Tata Megraw Hill 2.| Embedded systems _| StibuK. V ISBN _978-0-07-014589-4 Internet OF Things-A | Arshadeep Bahga, Vijay | University Press |__>+ | Hands-on Approach Madisetti, ISBN 978-8-17371-954-7 The Basies of Digital Elsevier 4 | Forensic John Sammons ISBN 978-1-59749-661-2 5, | Disital Forensic De Makeshi tan Wiley Publishing Inc. "| (2017 Edition) i nenany) ISBN: 978-81-265-6574-0 Kalbande Flacking for Dummies Wiley Publishing Ine. © | (Sth Edition) Kevin Beaver CISSP | isp: 978-81-265-6554-2 41 SOFTWARE/LEARNING WEBSITES a) https://www.allitebooks.in/the-internet-of-things! b) _https://www.versatek.com/vp-content/uploads/2016/06/loT-eBook-versionS.pdf ©) _htips://www.tutorialspoint.conv/internet_of_things/internet_of things tutorial.pdf 4d) _http://www.spmkck.co.in/Notes/Learning20Internet%2001%20Things.pdf ©) https://resources.infosecinstitute.com/digital-forensics-models/#gref. 1) _https://www-researchgate.net/publication/300474145_Digital_Forensics/download ) _ htips://docs.microsoft.com/en-us/sysinternals/downloads/psloggedon hh) www.openwall.com/passwords/windows-pwdump i) _https://www.tutorialspoint.convethical_hacking/ethical_hacking_process.htm j)_ hitps:/slideplayer.comvslide/7480056/ MSBTE — Final Copy Dt. 24.09.2019 Page 9 of 9 i: Web fased Application development with PHP Course Code: 22619 Program Name : Computer Engineering Program Group Program Code : CO/CMAF/CW Semester ixth Course Title : Web Based Application development with PHP Course Code + 22619 1. RATIONALE PHP is a general purpose, server-side scripting language run a web sever that's designed to make dynamic pages and applications. PHP as a web development op secure, fast and reliable, In the growing field of Web technology it is essential for every Diploma pass outs to Jean PHP Language to help them build interactive web applications. This course is designed to inculcate web based applications development skills in students using server side scripting with PHP. 2. COMPETENCY The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences: «Develop simple web-based application using PHP language. 3. COURSE OUTCOMES (COs) The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency: a) Develop program using control statement. b) Perform operations based on arrays and graphics. c) Develop programs by applying various object oriented concepts. d) Use form controls with validation to collect user’s input. ¢) Perform database operations in PHP. 4. TEACHING AND EXAMINATION SCHEME, Teaching Pr Ts Fast Lip [*T paper [ESE PA Total ESE PA | Total Hrs, |Max_|Min | Max [Min | Max |Min| Max | Min | Max | Min | Max | Min s{-[2 [ss | % | 28 [30° | 00 [100 | 40] asf 10 | 25 | wo | so | 20 (*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to ‘facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken ‘during the semester for the assessment of the UOs required for the attainment of the COs. Legends: L-Lecture; T ~ Tutorial/Teacher Guided Theory Practice; P - Practical; C— Credit, ESE - End Semester Examination; PA - Progressive Assessment 5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) This course map illustrates an overview of the flow and linkages of the topics at various levels of outcomes (details in subsequent sections) to be attained by the student by the end of the course, in all domains of learning in terms of the industry/employer identified competency depicted at the centre of this map. » MSBTE ~ Final Copy Dt. 24.09.2019 Page 1 of 7 Wich Based Application development with PHP. - Couse Code: 22619 pi pet 9S 7 1 Ba Figure 1 - Course Map 6. SUGGESTED PRACTICALS/ EXERCISES ‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. | Approx. S Practical Outcomes (PrOs) Unit | Hrs, 0. No. Required ‘a, Install and configure PHP, web server, MYSQL 1 |b: Write a program to print “Welcome to PHP”. 1 Pa ¢. Write a simple PHP program using expressions and operators. 2 Write a PHP program to demonstrate the use of Decision making control structures using- a. If-statement 1 02" b. Ifelse statement c._ Switch statement - 3 | Write a PHP program to demonstrate the use of Looping structures using- a. While statement, b. Do-while statement c.For statement 4. Foreach statement MSBTE — Final Copy Dt. 24.09.2019 Page 2 0f7 ‘ich Based Applisation development wih PHP Course Code: 22619 | Approx. Pd Practical Outcomes (PrOs) Sait Hrs. . | Required 4 | Write a PHP program for ereating and manipul : a. Indexed array i 0 b. Associative array c. Multidimensional arra 5 | a. Write a PHP program to— Caleulate length of string. ii, Count the number of words in string -without using | jy | gps string functions. b. Write a simple PHP program to demonstrate use of various built-in string funetions. 6 | Write a simple PHP program to demonstrate use of Simple |, oo function and Parameterized function. 7 | Write a simple PHP program to create PDF document by using | 1, o graphics concepts 3 | Write a PHP program to- a. Inherit members of super class in subclass. m | oo b. Create constructor to initialize object of class ~by using object oriented concepts 9 [Write a simple PHP program on Introspection and |, | gy Serialization. TO | Design a web page using following form controls: wl oo a. Text box, b. Radio button, c, Check box, d. Buttons TT [Design a web page using following form controls: wl om a, List box, b, Combo box, ¢. Hidden field box 12 [Develop web page with data validation. W_|_0* | 13. | Write simple PHP program to - a, Set cookies and read it. wv | 02* b, Demonstrate session Management. 14 [Write a simple PHP program for sending and receiving plain | yy | ype text message (e-mail). 15 | Develop a simple application to- a. Enter data into database v 02* b. Retrieve and present data from database. T6 | Develop a simple application to Update, Delete table data from | yy ge database. Total 32 Not i. A suggestive list of PrOs is given in the above table. More such PrOs can be added to attain the COs and competency. All the above listed practical need to be performed compulsorily, so that the student reaches the ‘Applying Level’ of Bloom's ‘Cognitive Domain Taxonomy’ as generally required by the industry, ii. The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed according to a suggested sample given below. Ss. No. Performance Indicators Weightage in a. Write appropriate code to generate desired output in Web application f' MSBTE — Final Copy Dt. 24.09.2019 Page 3 of 7 Web Based Application development with PHP Course Code: 22619 S. Performance Indicators Weightage in No. —% 2 | Debug, Test and Execute the programs = | 30 3__| Presentation of Output 20 |__| Able to Answer to oral questions 10 5 Submission of report in time { 10 Total _ 100 The above PrOs also comprise of the following social skills/attitudes which are Affective Domain Outcomes (ADOs) that are best developed through the laboratory/field based experiences: a) Work collaboratively in team. b) Follow ethical practices. ‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of practical experiences over a period of time. Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below: © ‘Valuing Level’ in 1" year * ‘Organization Level’ in 2™ year. * ‘Characterization Level’ in 3" year. 7. MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED The major equipment with broad specification mentioned here will usher in uniformity in conduct of practicals, as well as aid to procure equipment by authorities concerned. *., Equipment Name with Broad Specifications 1 | Hardware = Computer system |__| (Any computer system, preferably i3 - iS with basic configuration) All 2 | Operating system : Windows / Linux || 3__| Any database too! such as MySQL, MariaDB or any equivalent tool — | 15.16 8. _ UNDERPINNING THEORY COMPONENTS: The following topics/subtopics should be taught and assessed in order to develop UOs in cognitive domain for achieving the COs to attain the identified competency. More UOs could be added . Unit Unit Outcomes (UOs) ‘Topies and Sub-topies (in cognitive domain) Unit—1 | 1a Write simple PHP program | 1.1 History and Advantages of PHP, , Expression] to solve the given Syntax of PHP. sand expression 1.2. Variables, Data types, Expressions control | 1b Use relevant decision and operators, constants statements | making control statement to | 1.3. Decision making Control statements - in PHP solve the given problem if, if-else, nested if, switeh, break and le Solve the given iterative continue statement, = problem using relevant loop | 1.4 Loop control structures-while doz | statement. while , for an MSBTE — Final Copy Dt. 24.09.2019 Page 4 of 7 Web Based Applicaton development ih PHP. Course Code: 22619 Unit “Gneogntive doma °° ‘Topies and Sub-topics Unit-I [2a Manipulate the given type | 2.1 Creating and Manipulating Array, Arrays, of arrays to get the desired Types of Arrays- Indexed , Funetions result. ‘Associative and Multi-dimensional and 2b Apply implode, explode arrays Graphies functions on the given array. | 2.2 Extracting data from arrays, implode, 2c Apply the given string explode, and array flip. functions on the character | 2.3 Traversing Arrays array. 2.4 Function and its types —User defined 2d_ Scale the given image using function, Variable function and graphics concepts! Anonymous function, function 2.5. Operations on String and String fanctions:str_word_count()strlen(),str rev(),strpos(),str_replace(), uewords(),strtoupper(), strtolower(),stremp(). 2.6 Basic Graphics Concepts, Creating Images, Images with text, Scaling Images, Creation of PDF document. Unit-T1 3a_ Write constructor and 3.1 Creating Classes and Objects Apply destructor functions for the | 3.2. Constructor and Destructor Object given problem in PHP. 3.3. Inheritance, Overloading and Oriented | 3b Implement inheritance to Overriding, Cloning Object. Concepts extend the given base class. | 3.4 Introspection, Serializati inPHP — |3c_ Use overloading / overriding to solve the given problem. 3d_Clone the given object. 7 Unit-IV [4a Use the relevant form 4.1 Creating a webpage using GUI Creating controls to get user’s input Components, Browser Role-GET and and 4b Design web pages using POST methods, Server Role validating | multiple Forms for the given | 4.2 Form controls: text box, text area, forms problem. radio button, check box, list, buttons 4c Apply the given validation | 4.3 Working with multiple forms : rules on form. - A web page having many forms 4d_ Set/ modify/ delete cookies ~ A form having multiple submit using cookies attributes. buttons. 4e Manage the given session | 4.4 Web page validation. using session variables. 4.5. Cookies - Use of cookies, Attributes of cookies, create cookies, modify cookies value, and delete cookies. 4.6 Session - Use of session, Start session, get session variables, destroy session. | 4.7 Sending E-mail. - Unit-V_[5a Create database for the | 5.1 Introduction to MySQL ~ Create a Database given problem using PHP database. Operation script. 5.2 Connecting to a MySQlL.-database : s 5b_ Insert data in the given MySQL database sever from PHP database using PHP script. | 5.3 Database operaffons: Insertdata,” Se Apply the specified update Retrieving the Query result\\ operation in database record_| 5.4 Update and delete operations on table MSBTE — Final Copy Dt. 24.09.2019 Page 5 of7 ws a Wel Bascd Application development with PHP. Couree Code: 22619 Unit Outcomes (UOs) cognitive domain) using PHP script. data 5d_ Delete the given record from the database using __PHP script. ‘Topics and Sub-topies Note: To attain the COs and competency, above listed UOs need to be undertaken to achieve the ‘Application Level’ of Bloom’s ‘Cognitive Domain Taxonomy’ 9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN is «|_Distribution of Theory Marks = Unit Title Teaching "RT ou [A ‘| Total 7 * | Levet_| Levet | Level | Marks i Expressions and control statements in 7 o | os 2 T_| Arrays, Functions and Graphics 10 @ 04 | 10 16 7 Apply Object Oriented Concepts in a 7 ‘ou | io i’ TV_| Creating and validating forms 12 @ [06 | 12 V_| Database operations 08 o | 04 | 08 14 [ Total 48. 10 1s | 42 | 70 Legends: R=Remember, U=Understand, A~Apply and above (Bloom's Revised taxonomy) Note: This specification table provides general guidelines to assist student for their learning and to teachers to teach and assess students with respect to attainment of UOs. The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table. 10, SUGGESTED STUDENT ACTIVITIES Other than the classroom and laboratory learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences for their (student’s) portfolio which will be useful for their placement interviews: a) Prepare journal of practicals. b) Undertake micro-projects. i. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any) ‘These are sample strategies, which the teacher can use to accelerate the attainment of the various learning outcomes in this course: a) Massive open online courses (MOOCs) may be used to teach various topies/sub topics b) ‘L’ im item No. 4 does not mean only the traditional lecture method, but different types of teaching methods and media that are to be employed to develop the outcomes. ©) About 15-20% of the topics/sub-topies which is relatively simpler or descriptive in nature is to be given to the students for self-directed learning and assess the development of the COs through classroom presentations (see_impeyaen guideline for details). d) With respect to item No.10, teachers need to ensure 10 create opportnn provisions for co-curricular activities. MSBTE - Final Copy Dt. 24.09.2019 Page 6 of 7 1 Wb Based Applicaton development with PHP Course Code: 22619 e) Guide student(s) in undertaking micro-projects. 1) Demonstrate students thoroughly before they start doing the practice. 2) Encourage students to refer different websites to have deeper understanding of the subject. h) Observe continuously and monitor the performance of students in Lab. 12. SUGGESTED MICRO-PROJECTS, Only one micro-project is planned to be undertaken by a student that needs to be him/her in the beginning of the semester. In the first four semesters, the micro-proje: group-based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three. The micro-project could be industry application based, internet-based, workshop- based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain dated work diary consisting of individual contribution in the project work and give a seminar presentation of it before submission. The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit micro-project by the end of the semester to develop the industry-oriented COs. ‘A suggestive list of micro-projects is given here. Similar micro-projects could be added by the concerned faculty a) Develop web application for- Sending plain text email, Sending HTML message, Sending e-mails with attachment b) Develop web application for Library Management system. ~ Add book , Display list of book , Search book ©) Develop web application for Student Feedback System. 4) Develop web application for Employee Pay Management System. (Any other micro-projects suggested by subject faculty on similar line.) 13,__ SUGGESTED LEARNING RESOURCES. No, | Title of Book Author Publication 1 | Programming PHP | Rasmus Lerdork, | O'Reilly, USA, ISBN -078-1-449- Kevin.T and Peter M. | 39277-2, 2013 2 | The Complete Holzner, Steven [McGraw hill, New Delhi, Reference PHP (Third ISBN 9780070223622, 2008 Edition covers PHP) _ 3 | PHP and MySQL MeGrath, Mike MoGraw Hill, New Delhi, ISBN- - __|13:978-1259029431 7 [Advance Web Di. Rajedta Kawle | Devraj Publication , ISBN 978-93- Technolog ft 86492-01-2 14, SORTWARE/LEARNING WEBSITES a) _https://www.w3schools.com/php/default.asp b) _hitps://www.guru99,com/what-is-php-first-php-program.html ©) _hitps://www.tutorialspoint.com/php/ 4d) _https://tutorialehtml.com/en/php-tutorial-introduction/ ©) wwwatizag.com/phpT/ 1) _hitps://books.goalkicker.com/PHPBook/ c.com/watch/php-ba: ~ Final Copy Dt. 24.09.2019 Page 7 of 7 Network and Information Security Course Code: 22620 ProgramName _: Computer Engineering Program Group Program Code O}CM/LF/CW Semester : Sixth Course Title : Network and Information Security Course Code + 22620 1. RATIONALE Computer network security is an important aspect in today’s world. Now days due to various threats designing security in organization is an important consideration. It is essential to understand basic security principles, various threats to security and techniques to address these threats. The student will be able to recognize potential threats to confidentiality, integrity and availability and also able to implement various computer security policies. This course will introduce basic cryptographic techniques, fundamentals of computer/network security, Risks faced by computers and networks, security mechanisms, operating system security, secure System design principles, and network security principles. Also it will ereate awareness about IT ACT and different Cyber laws. 2. COMPETENCY The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences: © Maintain Network and Information security of an organization. 3. COURSE OUTCOMES (COs) The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency: a) Identify risks related to Computer security and Information hazard in various situations. b) Apply user identification and authentication methods, ©) Apply cryptographic algorithms and protocols to maintain Computer Security. ) Apply measures to prevent attacks on network using firewall. ©) Maintain secured networks and describe Information Security Compliance standards, 4, ‘ACHING AND EXAMINATION SCHEME ‘Teaching | Scheme —| Credit Theory Practical Lt |p |°*T?) Paper [__ESI PA Total | PA Total |_| irs. [Max | Min | Max [Min | Max | Min| Max | Min | Max | Min | Max | Min 3{-[2]|_s | 3 | 20 | 28 | 30* | 00 [ 100 | 40 | 25@] 10 | 25 | 10 | 50 | 20 (*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessment of the UOs required for the attainment of the COs. Legends: L-Lecture; T - Tutorial/Teacher Guided Theory Practice; P -Practical; C ~ Credit, ESE -End Semester Examination; PA - Progressive Assessment 8. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) &K \ This course map illustrates an overview of the flow and linkages of the topics afarious levels \>\ of outcomes (details in subsequent sections) to be attained by the student by the end of the) 24.09.2019 Page lof 8 rel MSBTE - Final Copy D Network and Information Security Course Code: 22620 course, in all domains of learning in terms of the industry/employer ide depicted at the centre of this map. ied competency Cee Ries \ conic shat Deiat. iii eitpe ) a eR. i, Cee Figure 1 - Course Map 6. SUGGESTED PRACTICALS/ EXERCISES, The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. —= - unit | APPrOx- Practical Outcomes (PrOs) Hrs. No. Required | a. Install and configure Antivirus software on system (any). I 2 | b. Set up operating system Updaies. Perform Backup and Restore of the system, | Set up passwords to operating system and applications. Apply security to file folder or application using access permissions and verify. _| Write a program to implement Caesar Cipher Write a program to implement Vernam Cipher Create and verify Hash Code for given message Write a program to implement Rail fence technique Write a program to implement Simple Columnar Transposition technique - ve Jolsjaful = fol] — | 2 e MSBTE — 1 Copy Dt. 24.09.2019 Page 2 of & ol Network and Information Security Course Code: 22620 | ADProx. S Practical Outcomes (PrOs) Unit | is. 0. No. : Required 10 | Create and verify digital signature using tool (e.g. Cryptool) Mi 2 11 | Use Steganography to encode and decode the message using any | IIT 2 tool. 12. | _& Install firewall on any operating system. _| b. Configure firewall settings on any operating system. Vv 2 13 _| Create and verify Digital Certificate using tool (e.g. Cryptool) Vv 2 14 | Trace the origin of Email using any tool(e.g. email TrackerPro) v [2 15__| Trace the path of web site using Tracert Utilit Vv 2 PGP Email Security 16 | a. Generate Public and Private Key Pair. v 2 b._Enerypt and Decrypt message using key pair. Total | 32 Note 7. A suggestive list of PrOs is given in the above table. More such PrOs can be added 10 attain the COs and competency. All the above listed practical need to be performed compulsorily, so that the student reaches the ‘Applying Level’ of Blooms’s ‘Cognitive Domain Taxonomy’ as generally required by the industry. ii. The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed according to a suggested sample given below: S.No. Performance Indicators Weightage in % 1 Correctness of the flow of procedures. 40 2 Debugging ability. 20 3 Quality of input and output displayed (messaging and 10 formatting) 4 Answer to sample questions 20 3 Submission of report in time 1 | L Total 100 The above PrOs also comprise of the following social skills/attitudes which are Affective Domain Outcomes (ADOs) that are best developed through the laboratory/field based experiences: a) Work collaboratively in team b) Follow ethical Practices. ‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of practical experiences over a period of time. Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below: © ‘Valuing Level’ in 1" year © ‘Organization Level’ in 2" year. © ‘Characterization Level’ in 3" year. 7. MAJOR EQUIPMENT/ INSTRUMENTSREQUIRED ‘The major equipment with broad specification mentioned here will us MSBTE ~ Final Copy Dt. 24.09.2019 Page 3 of 8 ol Network and Information Security Course Code: 22620 i Equipment Name with Broad Specifications Hi > T | Computer system ‘All (Any computer system with basic configuration) [2__| Antivirus Software(any) 7 [ 3 [Any compiler : 6189 4 _| Encryption Decryption tool(preferably Open source based) 10,13 5__ | Steganography Tools. (preferably Open source based) I | 6 | E-mail tracing Tools, (preferably Open source based) 4 7__[ Web tracing Tools. (preferably Open source based) 15 8. _ UNDERPINNING THEORY COMPONENTS ‘The following topics/subtopics should be taught and assessed in order to develop UOs in cognitive domain for achieving the COs to attain the identified competency. More UOs could be added. Unit Unit Outcomes (UOs) Topies and Sub-topies (in cognitive domain) Unit —1 Ja, Explain the importance of |I.1 Foundations of Computer Security: Introduction | the given component of Definition and Need of computer security, toComputer | computer security. Security Basies: Confidentiality, Integrity, and 1b. Explain the characteristics Availability, Accountability, Non- Information of the given type of threat, Repudiation and Re ity. Security | 1¢, Explain the given type of | |1-2 Risk and Threat Analysis: Assets, attacks related with Vulnerability, Threats, Risks, Counter security. measures, 1d. Describe the features of |!-3 Threat to Security: Viruses, Phases of Viruses, Types of Virus, Dealing with Viruses, Worms, Trojan Horse, Intruders, Insiders. 1.4 Type of Attacks: Active and Passive attacks, Denial of Service, DDOS, Backdoors and Trapdoors, Sniffing, Spoofing, Man in the Middle, Replay, TCP/IP — Hacking, Encryption attacks, 1.5 Operating system security: Operating system updates : HotFix, Patch, Service Pack. 1.6 Information, Need and Importance of Information, information classification, criteria for information classification, Security, need of security, Basies principles of information security, given type of update of operating system. Je. Classify Information, 1f. Explain Principles of Information Security, MSBTE - Final Copy Dt. 24.09.2019 Page 4 of 8 Network and Information Security Course Code: 22620 Unit Unit Outcomes (UOs) Topics and Sub-topics _ (in cognitive domain) Unit- 2a. Explain techniques of the | 2.1 Identification and Authentication: User User given type of attack on name and Password, Guessing password, Authenticati passwords. Password attacks-Piggybacking, Shoulder on and 2b, Explain mechanism of the | __ surfing, Dumpster diving. ‘Access given type of Biometric. | 2.2 Biometrics: Finger Prints, Hand prints, Control 2c. Apply the relevant Retina, patterns, Voice patterns, Signature Authentication method and Writing patterns, Keystrokes. for the given situation 2.3 Access controls: Definition, Authentication with an example. Mechanism, principle-Authentication, 2d. Describe features of the Authorization, Audit, Policies: DAC, given access control MAGRBAC. polic} Unit— TT 3a. Encrypt/Decrypt the given | 3.1 Introduction: Plain Text, Cipher Text, Cryptograph | text using different Cryptography, Cryptanalysis, Cryptology, y substitution techniques. Encryption, Decryption. 3b. Convert plain text to 3.2 Substitution Techniques: Caesar’s cipher, cipher text and vice versa Modified Caesar’s Cipher, Transposition using the given Techniques: Simple Columnar transposition technique. Transposition. 3c. Convert the given 3.3 Steganography : Procedure message using 3.4 Symmetric and Asymmetric cryptography: steganography. Introduction to Symmetric encryption, DE 3d, Explain the given (Data encryption Standard) algorithm, technique of cryptography | symmetric Key exyptography: Digital < Signature. using example. Unit-IV__|4a, Compare types of firewall (4.1 Firewall : Need of Firewall, types of Firewall and | on the given parameter(s). firewall- Packet Filters, Stateful Packet Intrusion _|4b. Explain function of the Filters, Application Gateways, Circui Detection given type of firewall gateways. System configuration. l4.2 Firewall Policies, Configuration, 4c. Compare various IDS limitations, DMZ. techniques on the given 4,3 Intrusion Detection System parameter(s). Vulnerability Assessment, — Misuse 4d. Describe features of the detection, Anomaly Detection, Network- | given IDS technique. Based IDS, Host-Based IDS, Honeypots Unit-V 3a. Explain the given '5.1 Kerberos : Working, AS, TGS, SS Network component of Kerberos [5.2 IP_ Sceurity- Overview, Protocols- AH, Security, authentication protocol. ESP, Modes- transport and Tunnel. Cyber Laws |5b. Explain the given IP 5.3. Email security- SMTP, PEM, PGP. and Security protocol with [5.4 Public key infrastructure (PKI): Compliance | modes. Introduction, Certificates, Certificate Standards. |Sc. Explain working of the authority, Registration Authority, given protocol for Email X.509/PKIX certificate format, security. [5.5 Cyber Crime: Introduction, Hacking , Sd, Describe the given Digital Forgery, Cyber component of Public Key Stalking/Harassment, Cyber, hy Infrastructur , Identity Theft and on Se. Classify the given Cyber terrorism, Cyber Defamation. — I crime 5.6 Cyber Laws: _Intfoduction, need, MSBTE — Final Copy Dt. 24.09.2019 Page Sof 8 a Network and Information Security Course Code: 22620 Unit Unit Outcomes (UOs) Topies and Sub-topies (in cognitive domain) _| r ~ |5f. Explain the specified egories: Crime against Individual, Cyber law, Government, Property. 5g, Describe compliance ‘5.7 Compliance standards: Implementing and standards for Information Information Security Management Security, System, ISO 27001, ISO 20000, BS 25999, PCI DSS, ITIL framework, _|__ COBIT framework. Note:To attain the COs and competency, above listed UOs need to be undertaken to achieve the ‘Application Level’ of Bloom's ‘Cognitive Domain Taxonomy” 9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN Unit Unit Title ' Jeaching | Distribution of Theory Marks No. Hours R U | A | Total _ Level_| Level | Level | Marks [__ | Introduction to Computer and D o | o | o | 1 Information Security | | tl User Authentication and Access 06 04 04 02 10 Control - II_| Cryptography 06 02 04 08 14 1v_| Firewall and Intrusion Detection D os | o6 | os | as System : y_| Network Security, Cyber Laws and D o os | @ | a Compliance Standards. a Total] 48 2 [2% | 2 | 7 Legends: R-Remember, U=Understand, A=Apply and above (Bloom’s Revised taxonomy) Note: This specification table provides general guidelines to assist student for their learning ‘and to teachers to teach and assess students with respect to attainment of UOs, The actual distribution of marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table. 10, | SUGGESTED STUDENT ACTIVITIES Other than the classroom and laboratory learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various outcomes in this course: Students should conduct following activities in group and prepare reports of about 5 pages for each activity, also collect/record physical evidences for their (student’s) portfolio which will be useful for their placement interviews: a) Prepare journal of practicals. b) Undertake micro-projects. 11, SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any) These are sample strategies, which the teacher can use to accelerate the attainment of the various learning outcomes in this course: a) Massive open online courses (MOOCs) may be used to teach various topies/sub topics. Tae b) ‘L’ in item No. 4 does not mean only the traditional lecture methostu dilleratiy types of teaching methods and media that are to be employed to develéys the outcomes. -\ ©) About 15-20% of the topics/sub-topies which is relatively simpler! 4 nature is to be given to the students for self-directed learning and assess the Xe. ‘nal Copy Dt. 24.09.2019 Page 6 0f8 X 6 Network and Information Security Course Code: 22620 development of the COs through classroom presentations (see implementation guideline for details). 4) With respect to item No.10, teachers need to ensure to create opportunities and provisions for co-curricular activities. €) Guide student(s) in undertaking micro-projects. {) Demonstrate students thoroughly before they start doing the practice. 2) Encourage students to refer different websites to have deeper understan: subject. h) Observe continuously and monitor the performance of students in Lab. ig of the 12, SUGGESTED MICRO-PROJECTS Only one micro-project is planned to be undertaken by a student that needs to be assigned to him/her in the beginning of the semester. In the first four semesters, the micro-project is group-based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three. The micro-project could be industry application based, internet-based, workshop- based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain dated work diary consisting of individual contribution in the project work and give a seminar presentation of it before submission, The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit micro-project by the end of the semester to develop the industry-oriented COs. ‘A suggestive list of micro-projects is given here. Similar micro-projects could be added by the concerned faculty: a) Case Studies in Secure Computing: Achievements and Trends. b) Implement Client/Server communication using cryptography tools in your laboratory, ¢) Create digital certificate for your departmental! personal communication. 4) Implement communication system using steganography. Encrypt image and message using any cryptography technique. e) Implement communication system using steganography using audio files. Encrypt audiofile and message using any cryptography technique. f) Implement Three Level Password Authentication System, 2) Any other micro-projects suggested by subject faculty on similar line 13, SUGGESTED LEARNING RESOURCES Title of Book Author Publication Computer Security | Dieter Golimann _| Wiley Publication, New Delhi, ISBN : 978-0-470-74115-3 Gyptography and Atul Kahate ‘McGraw Hill Education, New Delhi Network Security __ | ISBN: 978-1-25-902988-2 Cyber Laws And IT Harish Chander | PHI Publication,New Delhi, 2012 Protection - ISBN: 978-81-203-4570-6 Implementing ‘Alan Calder ‘Van Haren Publishing Information Security ISBN-13: 978-9087535414 based on ISO 27001 / ISBN-10: 9087535414 ISO 27002 (Best Pras MSBTE — Final Copy Dt. 24.09.2019 Page 7 of 8 Network and Information Security Course Code: 22620 14. a) b) °) ad) 2 ) 8) h) i) i SOFTWARE/LEARNING WEBSITES http://nptel.ac.in/eourses/106105162/ https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.ht m hitp://learnthat.com/introduction-to-network-security/ https://freevideolectures.com/course/3027/cryptography-and-network-security https://oew.mit.edw/courses/electrical-engineering-and-computer-science/6-858- computer-systems-security-fall-2014/video-lectures! hittp://stylesuxx.github.io/steganography/ |tps://smartninja-pgp.appspot.com/ hitp://www.cyberlawsindia.net/eyber-india.htm! https:/www.upcounsel.com/cyber-law htip://eyberlaws.nev/cyber-law/ MSBTE - Final Copy Di. 24.09.2019 Page 8 of 8 Data Warehousing with Mining Techniques Course Code: 22621 ProgramName _: Computer Engineering Program Group Program Code : COICM/CW Semester : Sixth Course Title : Data Warehousing with Mining Techniques Course Code 222621 1. RATIONALE Data mining and warehousing are the essential components of decision support systems for the modern days in industry and business. These techniques enable students to take better and ster decisions. The objective of this course is to introduce students to various Data Mining and Data Warehousing concepts and techniques. This course introduce principles, algorithm, architecture, design and implementation of data mining and data warehousing techniques. Learning this course would improve the employment potential of students in the information management sector. 2. COMPETENCY The aim of this course is to help the student develop required skills so that they are able to acquire following competency: © Use Data mining techniques for data analysis to maintain Data warehouse. 3. COURSE OUTCOMES (COs) ‘The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency: a) Establish scope and necessity of Data Mining for various applications. b) Establish scope and necessity of Data warehouse for various applications. ©) Use concept of data mining components and techniques in designing data mining systems. 4) Use data mining tools for different applications e) Apply basic Statistical calculations on Data. 4. TEACHING AND EXAMINATION SCHEME Teaching Sao | oan amination Scheme — T - Practical ult] e [OTP paper [ESE | [Total ESE. PA Total Hrs. |Max [Min [Min | Max | Min| Max | Min | Max | Min | Max | Min 3[-[2)s [3 | [2 40 | 25@] 10 [25 | 10 | 50 | 20 (*): Under the theory PA, Out of 30 marks, 10 marks are for micro-project assessment to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for the assessment of the UOs required for the attainment of the COs. Legends: L-Lecture; T — Tutorial/Teacher Guided Theory Practice; P - Practical; C- Credit, SE - End Semester Examination; PA - Progressive Assessment 5. COURSE MAP (with sample COs, PrOs, UOs, ADOs and topics) a This course map illustrates an overview of the flow and linkages of the topics at various Jeyels of outcomes (details in subsequent sections) to be attained by the student by the end Vi MSBTE— 1 Copy Dt. 24.09.2019 Page 1 of 8 Jo Data Warehousing with Mining Techniques Course Code: 22621 course, in all domains of learning in terms of the industry/employer identified competency depicted at the centre of this map. re 1 - Course Map 6, SUGGESTED PRACTICALS/ EXERCISES ‘The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. . | Approx. < Practical Outcomes (PrOs) ty Hrs. 7 | Required T _ | Install Oracle Database Server and client. T 2 {2 Import Source Data structures in Oracle 1 02 3 [Develop Target Data structures in Oracle U 2 4 [Install data mining tool WEKA. Study the GUI explorer on WEKA | _Il 2 3 | Develop an application for OLAP and its operations: roll-up, drill | IIL | 02 down: © | Develop an application for OLAP and its operations: Slice and dice 7 | Implement data cleaning technique I (Data Preprocessing —Findi and replacing Missing value in sample Dataset.) MSBTE—Fial Copy DL 24092019 Page Do oS Data Warehousing with Mining Techniques Course Code: 22621 . Approx. e Practical Outcomes (PrOs) Unit | Hrs. No. No. s Required & | Tmplement data cleaning technique I (Data Transformation ~ | 0 ‘Transforming data from one format to another format on sample data set) 9 | Preprocess dataset WEATHER arif including creating an ARFF_ | IV | 02 file and reading it into WEKA, and using the WEKA Explorer. Part “1 10 | Preprocess dataset WEATHER arif including creating an ARFF | IV | 02 file and reading it into WEKA, and using the WEKA Explorer. Part “0 TT | Demonstration of preprocessing on dataset Customer arf Ww | includes-cteating-anAREE-fle-ancl- reading itinto- WEKA;and sing-the- WEKA Explorer-Attributes Selection and Normalization: 12 | Demonstration of preprocessing on dataset Customer.arff Ww] 0 inchides-creating an ARFF-file and-reading it-into WEKA,and using the WEKA Bxplorer-Draw various graphs using WEKA 13 | Perform Association technique on Customer dataset I v | 02 (implementing Apiori algorithm on customer dataset.) 14 | Perform Association technique on Customer dataset II, (Using v | classification algorithm of KNN on sample dataset) 13 | Apply clustering technique on Customer dataset I. (Using K-means | V | 02 clustering on sample customer dataset.) 16 | Apply clustering technique on Customer dataset Il. (Using K- vf} o means clustering on sample weather dataset) Total 32 Note, i. A suggestive list of PrOs is given in the above table. More such PrOs can be added to attain the COs and competency. All the above listed practical need to be performed compulsorily, so that the student reaches the ‘Applying Level’ of Blooms's Domain Taxonomy’ as generally required by the industry. ii, The ‘Process’ and ‘Product’ related skills associated with each PrO are to be assessed according to a suggested sample given below: ‘Cognitive S.No. Performance Indicators ‘Weightage in % 1 Correctness of implementation of algorithm 40 2 Analysis and implementation ability 20 3 Quality of input and output displayed (messaging and 10 formatting) _ 4 ‘Answer to sample questions 20 5 ‘Submit report in time 10 Total 100 The above PrOs also comprise of the following social skills/attitudes which are Affective Domain Outcomes (ADOs) that are best developed through the laboratory/field based experiences: a) b) Work collaboratively in team fs Follow ethical practices. { MSBTE — Final Copy Dt. 24.09.2019 Page 3 of 8 \ Data Warehousing with Mining Techniques Course Code: 22621 ‘The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the acquisition of the ADOs takes place gradually in the student when s/he undertakes a series of practical experiences over a period of time. Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below: « ‘Valuing Level’ in 1“ year. * ‘Organization Level’ in 2" year. © ‘Characterization Level’ in 3" year. 7. MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED ‘The major equipment with broad specification mentioned here will usher in uniformity in conduct of practicals, as well as aid to procure equipment by authorities concerned. ee Equipment Name with Broad Specifications e roe Computer system All (Any computer system with basic configuration) | | Oracle Client and server Data Mining tool : WEKA 8. _ UNDERPINNING THEORY COMPONENTS The following topics/subtopics should be taught and assessed to develop UOs in cognitive domain for achieving the COs to attain the identified competency. More UOs could be added. Unit ‘Unit Outeomes (UOs) Topies and Sub-topics (in cognitive domain) | Unit—1 a, Describe need and 1.1 Data warehousing, Difference between Introduetion | architecture for the given Operational Database System and Data to Data data warehouse. warehouse. Warehousin | 1b. Explain the benefits of data {1.2 Need for data warehousing g warehousing of the given {1.3 A Multi tiered Architecture of data application. warehousing. lc. Describe the given Data 1.4. Data Warehouse Models: Enterprise warehouse Models. Warehouse, Data Mart, and Virtual 1d. Describe Extraction, Warehouse. Transformation and 1.5. Extraction, Transformation, and Loading for the given data Loading. warehouse 1.6 Metadata Repository. Je, Describe Metadata 1.7. Benefits of Data warchousing, Repository for the given _|__ data warehouse | MSBTE - Final Copy Dt. 24.09.2019 Page 40f8

You might also like